Human Visual Sensitivity Guided Bit Embedding for Video Steganography
نویسنده
چکیده
While watching a video human visual system gives more attention on the foreground objects than background objects. That is, human vision system pays more attention to the region of interest, such as the human faces in the video content. Most of the video steganography algorithms embed secret information in video by considering every part of the video frames with equal importance. So the capacity of the steganography could not be increased to maintain low visual distortion. The proposed system will detect the foreground and it will allocate different bit rates for different regions. By doing this the visual distortion will be maintained and the capacity can be increased up to 33%.
منابع مشابه
Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملAn Efficient Steganography Algorithm Based on Visual Cryptography and Least Significant Bit Embedding
Steganography is the process of concealing data within another data. The data may be in any form such as file, image, audio or video. The data to be concealed into another data is called secret data. The original data is called as cover data that hides the secret data. In this paper, an efficient steganography technique is presented which combine the visual cryptography with Least Significant B...
متن کاملDetection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملSingular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images
In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013